Skip to main content

Showing 1–25 of 25 results for author: Asghar, H J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.02563  [pdf, other

    cs.CR cs.LG

    Practical, Private Assurance of the Value of Collaboration

    Authors: Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar

    Abstract: Two parties wish to collaborate on their datasets. However, before they reveal their datasets to each other, the parties want to have the guarantee that the collaboration would be fruitful. We look at this problem from the point of view of machine learning, where one party is promised an improvement on its prediction model by incorporating data from the other party. The parties would only wish to… ▽ More

    Submitted 6 December, 2023; v1 submitted 3 October, 2023; originally announced October 2023.

  2. arXiv:2304.05561  [pdf, other

    cs.CV cs.CR cs.LG

    On the Adversarial Inversion of Deep Biometric Representations

    Authors: Gioacchino Tangari, Shreesh Keskar, Hassan Jameel Asghar, Dali Kaafar

    Abstract: Biometric authentication service providers often claim that it is not possible to reverse-engineer a user's raw biometric sample, such as a fingerprint or a face image, from its mathematical (feature-space) representation. In this paper, we investigate this claim on the specific example of deep neural network (DNN) embeddings. Inversion of DNN embeddings has been investigated for explaining deep i… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

  3. arXiv:2304.05371  [pdf, other

    cs.CL cs.AI cs.CR cs.LG

    Those Aren't Your Memories, They're Somebody Else's: Seeding Misinformation in Chat Bot Memories

    Authors: Conor Atkins, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Ian Wood, Mohamed Ali Kaafar

    Abstract: One of the new developments in chit-chat bots is a long-term memory mechanism that remembers information from past conversations for increasing engagement and consistency of responses. The bot is designed to extract knowledge of personal nature from their conversation partner, e.g., stating preference for a particular color. In this paper, we show that this memory mechanism can result in unintende… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

    Comments: To be published in 21st International Conference on Applied Cryptography and Network Security, ACNS 2023

  4. arXiv:2212.04008  [pdf, other

    cs.CR

    Use of Cryptography in Malware Obfuscation

    Authors: Hassan Jameel Asghar, Benjamin Zi Hao Zhao, Muhammad Ikram, Giang Nguyen, Dali Kaafar, Sean Lamont, Daniel Coscia

    Abstract: Malware authors often use cryptographic tools such as XOR encryption and block ciphers like AES to obfuscate part of the malware to evade detection. Use of cryptography may give the impression that these obfuscation techniques have some provable guarantees of success. In this paper, we take a closer look at the use of cryptographic tools to obfuscate malware. We first find that most techniques are… ▽ More

    Submitted 7 September, 2023; v1 submitted 7 December, 2022; originally announced December 2022.

    Comments: This is the full version of the paper with the same title to appear in the Journal of Computer Virology and Hacking Techniques

  5. arXiv:2211.02245  [pdf, other

    cs.CR cs.AI cs.LG

    Unintended Memorization and Timing Attacks in Named Entity Recognition Models

    Authors: Rana Salal Ali, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Tham Nguyen, Ian David Wood, Dali Kaafar

    Abstract: Named entity recognition models (NER), are widely used for identifying named entities (e.g., individuals, locations, and other information) in text documents. Machine learning based NER models are increasingly being applied in privacy-sensitive applications that need automatic and scalable identification of sensitive information to redact text for data sharing. In this paper, we study the setting… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: This is the full version of the paper with the same title accepted for publication in the Proceedings of the 23rd Privacy Enhancing Technologies Symposium, PETS 2023

  6. arXiv:2205.06641  [pdf, other

    cs.CR

    Privacy Preserving Release of Mobile Sensor Data

    Authors: Rahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Mohamed Ali Kaafar

    Abstract: Sensors embedded in mobile smart devices can monitor users' activity with high accuracy to provide a variety of services to end-users ranging from precise geolocation, health monitoring, and handwritten word recognition. However, this involves the risk of accessing and potentially disclosing sensitive information of individuals to the apps that may lead to privacy breaches. In this paper, we aim t… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: 12 pages, 10 figures, 1 table

  7. A Differentially Private Framework for Deep Learning with Convexified Loss Functions

    Authors: Zhigang Lu, Hassan Jameel Asghar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: Differential privacy (DP) has been applied in deep learning for preserving privacy of the underlying training sets. Existing DP practice falls into three categories - objective perturbation, gradient perturbation and output perturbation. They suffer from three main problems. First, conditions on objective functions limit objective perturbation in general deep learning tasks. Second, gradient pertu… ▽ More

    Submitted 3 April, 2022; originally announced April 2022.

    Comments: This paper has been accepted by the IEEE Transactions on Information Forensics & Security. Early access of IEEE Explore will be available soon

  8. arXiv:2109.09078  [pdf, other

    cs.CR cs.DB

    Making the Most of Parallel Composition in Differential Privacy

    Authors: Josh Smith, Hassan Jameel Asghar, Gianpaolo Gioiosa, Sirine Mrabet, Serge Gaspers, Paul Tyler

    Abstract: We show that the `optimal' use of the parallel composition theorem corresponds to finding the size of the largest subset of queries that `overlap' on the data domain, a quantity we call the \emph{maximum overlap} of the queries. It has previously been shown that a certain instance of this problem, formulated in terms of determining the sensitivity of the queries, is NP-hard, but also that it is po… ▽ More

    Submitted 19 September, 2021; originally announced September 2021.

    Comments: This is the full version of the paper with the same title to appear in the proceedings on the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  9. arXiv:2106.09904  [pdf, other

    cs.CR

    Sharing in a Trustless World: Privacy-Preserving Data Analytics with Potentially Cheating Participants

    Authors: Tham Nguyen, Hassan Jameel Asghar, Raghav Bhakar, Dali Kaafar, Farhad Farokhi

    Abstract: Lack of trust between organisations and privacy concerns about their data are impediments to an otherwise potentially symbiotic joint data analysis. We propose DataRing, a data sharing system that allows mutually mistrusting participants to query each others' datasets in a privacy-preserving manner while ensuring the correctness of input datasets and query answers even in the presence of (cheating… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  10. arXiv:2103.07101  [pdf, other

    cs.LG cs.CR

    On the (In)Feasibility of Attribute Inference Attacks on Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Aviral Agrawal, Catisha Coburn, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar, Darren Webb, Peter Dickinson

    Abstract: With an increase in low-cost machine learning APIs, advanced machine learning models may be trained on private datasets and monetized by providing them as a service. However, privacy researchers have demonstrated that these models may leak information about records in the training dataset via membership inference attacks. In this paper, we take a closer look at another inference attack reported in… ▽ More

    Submitted 12 March, 2021; originally announced March 2021.

    Comments: 20 pages, accepted at IEEE EuroS&P 2021

  11. arXiv:2007.11210  [pdf, other

    cs.CR cs.HC

    Exploiting Behavioral Side-Channels in Observation Resilient Cognitive Authentication Schemes

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar, Francesca Trevisan, Haiyue Yuan

    Abstract: Observation Resilient Authentication Schemes (ORAS) are a class of shared secret challenge-response identification schemes where a user mentally computes the response via a cognitive function to authenticate herself such that eavesdroppers cannot readily extract the secret. Security evaluation of ORAS generally involves quantifying information leaked via observed challenge-response pairs. However,… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

    Comments: Accepted into ACM Transactions on Privacy and Security. 32 Pages

  12. On the Resilience of Biometric Authentication Systems against Random Inputs

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar

    Abstract: We assess the security of machine learning based biometric authentication systems against an attacker who submits uniform random inputs, either as feature vectors or raw inputs, in order to find an accepting sample of a target user. The average false positive rate (FPR) of the system, i.e., the rate at which an impostor is incorrectly accepted as the legitimate user, may be interpreted as a measur… ▽ More

    Submitted 23 January, 2020; v1 submitted 12 January, 2020; originally announced January 2020.

    Comments: Accepted by NDSS2020, 18 pages

  13. arXiv:1908.10558  [pdf, other

    cs.CR cs.LG

    On Inferring Training Data Attributes in Machine Learning Models

    Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar

    Abstract: A number of recent works have demonstrated that API access to machine learning models leaks information about the dataset records used to train the models. Further, the work of \cite{somesh-overfit} shows that such membership inference attacks (MIAs) may be sufficient to construct a stronger breed of attribute inference attacks (AIAs), which given a partial view of a record can guess the missing a… ▽ More

    Submitted 12 October, 2019; v1 submitted 28 August, 2019; originally announced August 2019.

    Comments: Accepted by PPML'19, a CCS workshop. Submission of 4-pages bar references, and appendix V2: Update in dataset splitting, and comments on related works

  14. arXiv:1904.10629  [pdf, other

    cs.CR

    A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

    Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna

    Abstract: This paper focuses on reporting of Internet malicious activity (or mal-activity in short) by public blacklists with the objective of providing a systematic characterization of what has been reported over the years, and more importantly, the evolution of reported activities. Using an initial seed of 22 blacklists, covering the period from January 2007 to June 2017, we collect more than 51 million m… ▽ More

    Submitted 23 April, 2019; originally announced April 2019.

    Comments: ACM Asia Conference on Computer and Communications Security (AsiaCCS), 13 pages

  15. arXiv:1902.06414  [pdf, other

    cs.CR

    Averaging Attacks on Bounded Noise-based Disclosure Control Algorithms

    Authors: Hassan Jameel Asghar, Dali Kaafar

    Abstract: We describe and evaluate an attack that reconstructs the histogram of any target attribute of a sensitive dataset which can only be queried through a specific class of real-world privacy-preserving algorithms which we call bounded perturbation algorithms. A defining property of such an algorithm is that it perturbs answers to the queries by adding zero-mean noise distributed within a bounded (poss… ▽ More

    Submitted 4 November, 2019; v1 submitted 18 February, 2019; originally announced February 2019.

    Comments: Accepted for publication in Proceedings of PETS 2020

  16. arXiv:1902.01499  [pdf, other

    cs.CR cs.DS

    Differentially Private Release of High-Dimensional Datasets using the Gaussian Copula

    Authors: Hassan Jameel Asghar, Ming Ding, Thierry Rakotoarivelo, Sirine Mrabet, Mohamed Ali Kaafar

    Abstract: We propose a generic mechanism to efficiently release differentially private synthetic versions of high-dimensional datasets with high utility. The core technique in our mechanism is the use of copulas. Specifically, we use the Gaussian copula to define dependencies of attributes in the input dataset, whose rows are modelled as samples from an unknown multivariate distribution, and then sample syn… ▽ More

    Submitted 4 February, 2019; originally announced February 2019.

  17. arXiv:1811.03197  [pdf, other

    cs.CR cs.DS

    Private Continual Release of Real-Valued Data Streams

    Authors: Victor Perrier, Hassan Jameel Asghar, Dali Kaafar

    Abstract: We present a differentially private mechanism to display statistics (e.g., the moving average) of a stream of real valued observations where the bound on each observation is either too conservative or unknown in advance. This is particularly relevant to scenarios of real-time data monitoring and reporting, e.g., energy data through smart meters. Our focus is on real-world data streams whose distri… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Comments: Accepted for publication at NDSS 2019

  18. arXiv:1806.02389  [pdf, other

    stat.ML cs.LG

    Not All Attributes are Created Equal: $d_{\mathcal{X}}$-Private Mechanisms for Linear Queries

    Authors: Parameswaran Kamalaruban, Victor Perrier, Hassan Jameel Asghar, Mohamed Ali Kaafar

    Abstract: Differential privacy provides strong privacy guarantees simultaneously enabling useful insights from sensitive datasets. However, it provides the same level of protection for all elements (individuals and attributes) in the data. There are practical scenarios where some data attributes need more/less protection than others. In this paper, we consider $d_{\mathcal{X}}$-privacy, an instantiation of… ▽ More

    Submitted 28 August, 2019; v1 submitted 6 June, 2018; originally announced June 2018.

  19. arXiv:1705.08994  [pdf, ps, other

    cs.CR

    On the Privacy of the Opal Data Release: A Response

    Authors: Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kaafar

    Abstract: This document is a response to a report from the University of Melbourne on the privacy of the Opal dataset release. The Opal dataset was released by Data61 (CSIRO) in conjunction with the Transport for New South Wales (TfNSW). The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail,… ▽ More

    Submitted 24 May, 2017; originally announced May 2017.

  20. arXiv:1705.05957  [pdf, ps, other

    cs.CR

    Differentially Private Release of Public Transport Data: The Opal Use Case

    Authors: Hassan Jameel Asghar, Paul Tyler, Mohamed Ali Kaafar

    Abstract: This document describes the application of a differentially private algorithm to release public transport usage data from Transport for New South Wales (TfNSW), Australia. The data consists of two separate weeks of "tap-on/tap-off" data of individuals who used any of the four different modes of public transport from TfNSW: buses, light rail, train and ferries. These taps are recorded through the s… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

  21. arXiv:1610.09044  [pdf, other

    cs.CR

    BehavioCog: An Observation Resistant Authentication Scheme

    Authors: Jagmohan Chauhan, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Jonathan Chan, Mohamed Ali Kaafar

    Abstract: We propose that by integrating behavioural biometric gestures---such as drawing figures on a touch screen---with challenge-response based cognitive authentication schemes, we can benefit from the properties of both. On the one hand, we can improve the usability of existing cognitive schemes by significantly reducing the number of challenge-response rounds by (partially) relying on the hardness of… ▽ More

    Submitted 12 March, 2017; v1 submitted 27 October, 2016; originally announced October 2016.

  22. arXiv:1605.03772  [pdf, other

    cs.CR cs.NI

    SplitBox: Toward Efficient Private Network Function Virtualization

    Authors: Hassan Jameel Asghar, Luca Melis, Cyril Soldani, Emiliano De Cristofaro, Mohamed Ali Kaafar, Laurent Mathy

    Abstract: This paper presents SplitBox, a scalable system for privately processing network functions that are outsourced as software processes to the cloud. Specifically, providers processing the network functions do not learn the network policies instructing how the functions are to be processed. We first propose an abstract model of a generic network function based on match-action pairs, assuming that thi… ▽ More

    Submitted 12 May, 2016; originally announced May 2016.

    Comments: An earlier version of this paper appears in the Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Middleboxes and Network Function Virtualization (HotMiddleBox 2016). This is the full version

  23. arXiv:1603.06289  [pdf, other

    cs.CR

    Towards Seamless Tracking-Free Web: Improved Detection of Trackers via One-class Learning

    Authors: Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Balachander Krishnamurthy, Anirban Mahanti

    Abstract: Numerous tools have been developed to aggressively block the execution of popular JavaScript programs (JS) in Web browsers. Such blocking also affects functionality of webpages and impairs user experience. As a consequence, many privacy preserving tools (PP-Tools) that have been developed to limit online tracking, often executed via JS, may suffer from poor performance and limited uptake. A mechan… ▽ More

    Submitted 20 March, 2016; originally announced March 2016.

  24. Private Processing of Outsourced Network Functions: Feasibility and Constructions

    Authors: Luca Melis, Hassan Jameel Asghar, Emiliano De Cristofaro, Mohamed Ali Kaafar

    Abstract: Aiming to reduce the cost and complexity of maintaining networking infrastructures, organizations are increasingly outsourcing their network functions (e.g., firewalls, traffic shapers and intrusion detection systems) to the cloud, and a number of industrial players have started to offer network function virtualization (NFV)-based solutions. Alas, outsourcing network functions in its current setti… ▽ More

    Submitted 24 January, 2016; originally announced January 2016.

    Comments: A preliminary version of this paper appears in the 1st ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. This is the full version

  25. arXiv:1412.2855  [pdf, other

    cs.CR cs.HC

    Gesture-based Continuous Authentication for Wearable Devices: the Google Glass Case

    Authors: Jagmohan Chauhan, Hassan Jameel Asghar, Mohamed Ali Kaafar, Anirban Mahanti

    Abstract: We study the feasibility of touch gesture behavioural biometrics for implicit authentication of users on a smartglass (Google Glass) by proposing a continuous authentication system using two classifiers: SVM with RBF kernel, and a new classifier based on Chebyshev's concentration inequality. Based on data collected from 30 volunteers, we show that such authentication is feasible both in terms of c… ▽ More

    Submitted 8 May, 2016; v1 submitted 8 December, 2014; originally announced December 2014.